Power considerations for computers

Considering that computers won’t be able to run without one, it’s a shame that power supply units (PSU) rarely get as much attention as RAM or graphics cards. When it’s time to install a new workstation, business owners do not fully understand all the variables that go into choosing the correct PSU, and often select a product that is inefficient and more expensive than what was expected. The post Power considerations for computers appeared first on Health Security Solutions.
Read more

What you can learn from Equifax’s leak

When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be sorry twice. Read on so your business doesn't experience the same fate as the giant, bumbling credit bureau. The post What you can learn from Equifax’s leak appeared first on Health Security Solutions.
Read more

Beware of healthcare IoT security risks

The Internet of Things (IoT) has the potential to completely revolutionize the healthcare industry. Innovations like smart pacemakers and fitness trackers monitor patients’ vitals and unearth patterns that can lead to more accurate diagnoses. But like any new technology, it also brings a slew of security risks healthcare professionals need to address. The post Beware of healthcare IoT security risks appeared first on Health Security Solutions.
Read more

Stay on the line with a VoIP continuity plan

Voice over IP (VoIP) phone systems offer far superior mobility, functionality, and cost-efficiency than traditional landlines. But like any computer system, it can be vulnerable to service disruptions, equipment failure, and cyberattacks. With proper preparation, however, your phone systems can weather any disaster. The post Stay on the line with a VoIP continuity plan appeared first on Health Security Solutions.
Read more

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that's even more difficult to identify. The post New phishing scam targets Office 365 users appeared first on Health Security Solutions.
Read more

Watch out! More ransomware attacks incoming

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks. The post Watch out! More ransomware attacks incoming appeared first on Health Security Solutions.
Read more

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers. The post New Locky ransomware: what you need to know appeared first on Health Security Solutions.
Read more
Page 1 of 3123